Hello Jeremy,

thanks for this very helpful hint!

> Actual debug output from the Exim system.  I pointed out how best
> to do that on the 2nd (assuming that the Exim system is the
> accepting end for the connection).

> [ In case it's an outbound connection at issue, a simple way to get
>   debug is:
>             exim -d+all -odf fred@??? </dev/null 2>&1 | tee debuglog
[...]

> ]


doing so I was able to catch the GnuTLS failing connection:
======================================================================

17:46:01  1566 85.215.77.84 in hosts_require_ocsp? no (option unset)
17:46:01  1566 85.215.77.84 in hosts_request_ocsp? yes (matched "*")
17:46:01  1566 initialising GnuTLS as a client on fd 6
17:46:01  1566 GnuTLS global init required
17:46:01  1566 initialising GnuTLS client session
17:46:01  1566 Expanding various TLS configuration options for session 
credentials
17:46:01  1566 TLS: basic cred init, client
17:46:01  1566 TLS: no client certificate specified; okay
17:46:01  1566 Added 140 certificate authorities
17:46:01  1566 GnuTLS using default session cipher/priority "NORMAL"
17:46:01  1566 Setting D-H prime minimum acceptable bits to 1024
17:46:01  1566 85.215.77.84 in tls_verify_hosts? no (option unset)
17:46:01  1566 85.215.77.84 in tls_try_verify_hosts? yes (matched "*")
17:46:01  1566 85.215.77.84 in tls_verify_cert_hostnames? yes (matched "*")
17:46:01  1566 TLS: server cert verification includes hostname: 
"mx06.et.lindenberg.one"
17:46:01  1566 TLS: server certificate verification optional
17:46:01  1566 TLS: will request OCSP stapling
17:46:01  1566 85.215.77.84 in tls_resumption_hosts? no (option unset)
17:46:01  1566 about to gnutls_handshake
17:46:01  1566 TLS session fail: (gnutls_handshake): Key usage violation in 
certificate has been detected.
17:46:01  1566   SMTP(close)>>
17:46:01  1566 cmdlog: '220:EHLO:250-:STARTTLS:220'
17:46:01  1566 85.215.77.84 in hosts_require_tls? yes (matched "*")
17:46:01  1566 set_process_info:  1566 delivering 1sQU5Q-0000PD-2z: just tried 
mx06.et.lindenberg.one [85.215.77.84] for t...@mx06.et.lindenberg.one: result 
DEFER

and the OpenSSL working connection:
=====================================
17:32:15  1168   SMTP>> STARTTLS
17:32:15  1168 cmd buf flush 10 bytes
17:32:15  1168 read response data: size=24
17:32:15  1168   SMTP<< 220 Ready to start TLS
17:32:15  1168 85.215.77.84 in hosts_require_ocsp? no (option unset)
17:32:15  1168 85.215.77.84 in hosts_request_ocsp?
17:32:15  1168  list element: *
17:32:15  1168  85.215.77.84 in hosts_request_ocsp? yes (matched "*")
17:32:15  1168 setting  SSL CTX options: 0000000042004000
17:32:15  1168 Initialized TLS
17:32:15  1168 85.215.77.84 in tls_verify_hosts? no (option unset)
17:32:15  1168 85.215.77.84 in tls_try_verify_hosts?
17:32:15  1168  list element: *
17:32:15  1168  85.215.77.84 in tls_try_verify_hosts? yes (matched "*")
17:32:15  1168 tls_verify_certificates: system
17:32:15  1168 85.215.77.84 in tls_verify_cert_hostnames?
17:32:15  1168  list element: *
17:32:15  1168  85.215.77.84 in tls_verify_cert_hostnames? yes (matched "*")
17:32:15  1168 Cert hostname to check: "mx06.et.lindenberg.one"
17:32:15  1168 85.215.77.84 in tls_resumption_hosts? no (option unset)
17:32:15  1168 Calling SSL_connect
17:32:15  1168 SSL hshake_start: before SSL initialization
17:32:15  1168 SSL SSL_connect,state_chg: before SSL initialization
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS write client hello
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS write client hello
17:32:15  1168 SERVER_HANDSHAKE_TRAFFIC_SECRET ebdcb2de396f0ac9ef391a..
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS read server hello
17:32:15  1168 SSL SSL_connect,state_chg: TLSv1.3 read encrypted extensions
17:32:15  1168 LOG: MAIN
17:32:15  1168   [85.215.77.84] SSL verify error: depth=0 error=self-signed 
certificate 
cert=/C=DE/ST=BW/L=Karlsruhe/O=Lindenberg/OU=Tests/CN=et.lindenberg.one
17:32:15  1168 SSL verify failure overridden (host in tls_try_verify_hosts)
17:32:15  1168 mx06.et.lindenberg.one suitable for cert, per OpenSSL?  yes
17:32:15  1168 SSL verify ok: depth=0 
SN=/C=DE/ST=BW/L=Karlsruhe/O=Lindenberg/OU=Tests/CN=et.lindenberg.one
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS read server certificate
17:32:15  1168 SSL SSL_connect,state_chg: TLSv1.3 read server certificate verify
17:32:15  1168 EXPORTER_SECRET ebdcb2de396f0ac9ef391ac0e2f69d408fa87164...
17:32:15  1168 SERVER_TRAFFIC_SECRET_0 ebdcb2de396f0ac9ef391ac0e2f69d40...
17:32:15  1168 Received TLS status callback (OCSP stapling):
17:32:15  1168  null
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS read finished
17:32:15  1168 CLIENT_HANDSHAKE_TRAFFIC_SECRET ebdcb2de396f0ac9ef391ac0e2f...
17:32:15  1168 CLIENT_TRAFFIC_SECRET_0 ebdcb2de396f0ac9ef391ac0e2f69d408fa...
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS write finished
17:32:15  1168 SSL hshake_done: SSL negotiation finished successfully
17:32:15  1168 SSL_connect succeeded
17:32:15  1168 Cipher: TLS1.3:TLS_AES_256_GCM_SHA384:256
17:32:15  1168 Have channel bindings cached for possible auth usage 
0x55dfd11a8650 0x55dfcf15a680
17:32:15  1168   SMTP>> EHLO myMX.sub.myDomain.top
17:32:15  1168 cmd buf flush 34 bytes
17:32:15  1168 tls_write(0x55dfd11f0218, 34)
17:32:15  1168 SSL_write(0x55dfd130e380, 0x55dfd11f0218, 34)
17:32:15  1168 outbytes=34 error=0
17:32:15  1168 Calling SSL_read(0x55dfd130e380, 0x55dfd11ef218, 4096)
17:32:15  1168 SSL SSL_connect,state_chg: SSL negotiation finished successfully
17:32:15  1168 SSL SSL_connect,state_chg: SSL negotiation finished successfully
17:32:15  1168 SSL SSL_connect,state_chg: SSLv3/TLS read server session ticket
17:32:15  1168 read response data: size=62
17:32:15  1168   SMTP<< 250-mx01.et.lindenberg.one Hello 
kant.sub.simple-test-bed.de
17:32:15  1168 Calling SSL_read(0x55dfd130e380, 0x55dfd11ef218, 4096)
17:32:15  1168 read response data: size=10
17:32:15  1168          250 HELP
17:32:15  1168 not using PIPELINING
17:32:15  1168 not using DSN
17:32:15  1168 85.215.77.84 in hosts_require_auth? no (option unset)
17:32:15  1168   SMTP>> MAIL FROM:<r...@sub.simple-test-bed.de>
17:32:15  1168 cmd buf flush 41 bytes
17:32:15  1168 tls_write(0x55dfd11f0218, 41)
17:32:15  1168 SSL_write(0x55dfd130e380, 0x55dfd11f0218, 41)
17:32:15  1168 outbytes=41 error=0
17:32:15  1168 Calling SSL_read(0x55dfd130e380, 0x55dfd11ef218, 4096)
17:32:15  1168 read response data: size=13
17:32:15  1168   SMTP<< 250 OK MAIL
17:32:15  1168   SMTP>> RCPT TO:<t...@mx06.et.lindenberg.one>
17:32:15  1168 cmd buf flush 39 bytes
17:32:15  1168 tls_write(0x55dfd11f0218, 39)
17:32:15  1168 SSL_write(0x55dfd130e380, 0x55dfd11f0218, 39)
17:32:15  1168 outbytes=39 error=0
17:32:15  1168 sync_responses expect rcpt for t...@mx06.et.lindenberg.one
17:32:15  1168 Calling SSL_read(0x55dfd130e380, 0x55dfd11ef218, 4096)
17:32:15  1168 read response data: size=13
17:32:15  1168   SMTP<< 250 OK RCPT
17:32:15  1168   SMTP>> DATA
17:32:15  1168 cmd buf flush 6 bytes
17:32:15  1168 tls_write(0x55dfd11f0218, 6)
17:32:15  1168 SSL_write(0x55dfd130e380, 0x55dfd11f0218, 6)
17:32:15  1168 outbytes=6 error=0
17:32:15  1168 sync_responses expect data
17:32:16  1168 Calling SSL_read(0x55dfd130e380, 0x55dfd11ef218, 4096)
17:32:16  1168 read response data: size=37
17:32:16  1168   SMTP<< 354 End data with <CR><LF>.<CR><LF>
17:32:16  1168   SMTP>> (writing message)
lot of DKIM messages here....

So, the only thing I can see here is, that the remote MX does not offer OCSP 
stapling, which in case is also not required!
Furthermore I see, that with the very same configuration OpenSSL gives a LOT 
more information, than GNU-TLS.

Any ideas, if that can be the cause?


regards

  Wolfgang



-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to